REMOTE ACCESS TROJANS (RAT)
Transcript of REMOTE ACCESS TROJANS (RAT)
A CYBERCRIME TOOL TO GAIN UNLIMITED ACCESS TO YOUR COMPUTER
REMOTE ACCESS TROJANS (RAT)
PROTECT YOURSELF
INFECTED? WHAT TO DO NEXTOnce you think that the infec�on has been removed, change the passwords for your online accounts and check your banking ac�vity. Report anything unusual to your bank and, as needed, to your local law enforcement authori�es
Learn how to protect your computer from future infec�ons and avoid data loss
Run a full scan of your device and remove the threats by using security so�ware
Install security so�ware from a trustworthy source
Disconnect your device from the network as soon as possible, in order to prevent addi�onal malicious ac�vity
BE AWARE OF THE RAT – INFECTION SIGNS
Once installed, a RAT will allow cybercriminals to watch and listen through the camera and microphone, record all your on-screen ac�vity, alter your personal files and use your device to distribute malware to other computers.
SEND
TRANSMITATTACK
DELETEGATHER
Unknown programs are installed on your device (visible in the Control Panel, Add or Remove Programs)
Your internet connec�on is unusually slow
Unknown processes are running in your system (visible in the Task Manager, Processes tab)
Your files are modified or deleted without your permission
Cover your webcam when not in use
Only download apps and so�ware from sources you can trust
Ensure that your security so�ware and opera�ng system are up to date
Ensure that your device’s firewall (if available) is ac�ve
Do not click on links or a�achments within unexpected or suspicious emails
Be wary while browsing the internet and do not click on suspicious links, pop ups or dialogue boxes
Regularly back-up your data
Keep your web browser up to date and configured to alert you whenever a new window is opened or anything is downloaded
Crea
ted
by E
urop
ol